Entries by Mihai

Beware of Phishing

In recent weeks, we have seen a huge increase in hostile activities, especially phishing, spear phishing, whaling, email phishing, clone phishing, so we decided to take a step forward and show our readers how to spot such attempts, the latest hacking methods, tools, etc. File Sharing Applications Cybercriminals will often share a malicious link to […]

Whaling Attacks: Overview

Simply put, whaling is a sort of phishing attack that targets high-profile employees, such as managers, directors, C-suite positions, etc. The term “whaling” reflects the target of the attack, the “whale”, basically individuals who hold significant authority and high-level access to sensitive information. Unlike traditional phishing attacks that target the average person, whaling is a […]

Credential Stuffing: Overview

Credential stuffing is a very common type of cyberattack where cybercriminals use lists of stolen credentials, usually obtained from previous data breaches, attempting to access different accounts/websites. Once logged in, hackers will take over the account. How Credential Stuffing Works Firstly, hackers gather lists of usernames and passwords stolen in data breaches or buy them […]

The Zero Trust Security Framework

As organizations continue to embrace flexible/remote work, a comprehensive approach to IT security is more than necessary, it is crucial. The Zero Trust security works on a basic principle: never trust, always verify. So, regardless of the user, device, or application, Zero Trust security ensures every access request is carefully verified. Zero Trust & Data […]

Privileged Access Management: Best Practices

The more privileges a user or an app gets, the greater the potential for abuse or error. Implementing privileged access management (PAM) provides several benefits, including a smaller attack surface, which is easier to protect against internal and external threats. In simple terms, one of the most direct ways to implement Privileged Access Management is […]

Security Misconfiguration: Overview

With the move to the cloud and reliance on third-party solutions, one important vulnerability often occurs: security misconfiguration. The impact of security misconfigurations can be disastrous, but with proper precautions and cybersecurity, they can be prevented. Security misconfiguration represents any error or vulnerability in the setup of any system organizations rely on. There are many […]

Windows 10: End of Support

Microsoft have recently stated that support for Windows 10 will end on October 14, 2025. If you are still using Windows 10 after this date, your services will not stop, but Microsoft will no longer provide Windows 10 updates and free security patches. Note: Version 22H2 will be the last version of Microsoft Windows 10. […]

Identity & Access Management (Entra ID)

Microsoft Entra ID is a cloud-based identity and access management service for applications like Office365 and Azure. Entra ID Security Defaults Security defaults are a group of settings that help protect your organization from emerging threats and cyberattacks like brute force attacks, password spraying, phishing, etc. Security defaults include the following requirements: Register a multi-factor […]

File Share Phishing: Overview

Cybercriminals’ favorite way to break into a company right now is by sharing a document that leads to a fake Microsoft login page. The link could direct you to SharePoint, OneDrive, Dropbox, or another site, but the goal is always the same – they want access to your email account. Because this attack has become […]